
Suman Debnath
Examiner (ID: 7589, Phone: (571)270-1256 , Office: P/2495 )
| Most Active Art Unit | 2495 |
| Art Unit(s) | 2495, 2135, 2435 |
| Total Applications | 542 |
| Issued Applications | 357 |
| Pending Applications | 51 |
| Abandoned Applications | 143 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 20064737
[patent_doc_number] => 20250202959
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-06-19
[patent_title] => Share Restriction for Curated Playlists
[patent_app_type] => utility
[patent_app_number] => 18/960029
[patent_app_country] => US
[patent_app_date] => 2024-11-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9688
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 223
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18960029
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/960029 | Share Restriction for Curated Playlists | Nov 25, 2024 | Pending |
Array
(
[id] => 19965710
[patent_doc_number] => 12335235
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-06-17
[patent_title] => Methods and systems for efficient cybersecurity policy enforcement on network communications
[patent_app_type] => utility
[patent_app_number] => 18/943149
[patent_app_country] => US
[patent_app_date] => 2024-11-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 31
[patent_figures_cnt] => 33
[patent_no_of_words] => 52669
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 384
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18943149
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/943149 | Methods and systems for efficient cybersecurity policy enforcement on network communications | Nov 10, 2024 | Issued |
Array
(
[id] => 19787517
[patent_doc_number] => 20250061196
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-02-20
[patent_title] => Pattern similarity measures to quantify uncertainty in malware classification
[patent_app_type] => utility
[patent_app_number] => 18/936148
[patent_app_country] => US
[patent_app_date] => 2024-11-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6226
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 68
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18936148
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/936148 | Pattern similarity measures to quantify uncertainty in malware classification | Nov 3, 2024 | Pending |
Array
(
[id] => 19750579
[patent_doc_number] => 20250039144
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-01-30
[patent_title] => SECURITY GROUP RESOLUTION AT INGRESS ACROSS VIRTUAL NETWORKS
[patent_app_type] => utility
[patent_app_number] => 18/919222
[patent_app_country] => US
[patent_app_date] => 2024-10-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9479
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 266
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18919222
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/919222 | SECURITY GROUP RESOLUTION AT INGRESS ACROSS VIRTUAL NETWORKS | Oct 16, 2024 | Pending |
Array
(
[id] => 19893986
[patent_doc_number] => 20250119298
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-04-10
[patent_title] => SYSTEM AND METHOD FOR QUANTUM SAFE TRUST IDENTITY AND AUTHENTICATION
[patent_app_type] => utility
[patent_app_number] => 18/904396
[patent_app_country] => US
[patent_app_date] => 2024-10-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5780
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -23
[patent_words_short_claim] => 235
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18904396
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/904396 | SYSTEM AND METHOD FOR QUANTUM SAFE TRUST IDENTITY AND AUTHENTICATION | Oct 1, 2024 | Pending |
Array
(
[id] => 20559179
[patent_doc_number] => 20260058967
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2026-02-26
[patent_title] => Intent Determination and Control in an Enterprise Data Management and Monitoring System
[patent_app_type] => utility
[patent_app_number] => 18/810284
[patent_app_country] => US
[patent_app_date] => 2024-08-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 17600
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 86
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18810284
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/810284 | Intent Determination and Control in an Enterprise Data Management and Monitoring System | Aug 19, 2024 | Pending |
Array
(
[id] => 20267877
[patent_doc_number] => 12438882
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-10-07
[patent_title] => Method and system for managing global control group (GCG)
[patent_app_type] => utility
[patent_app_number] => 18/790563
[patent_app_country] => US
[patent_app_date] => 2024-07-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 0
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 225
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18790563
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/790563 | Method and system for managing global control group (GCG) | Jul 30, 2024 | Issued |
Array
(
[id] => 19677914
[patent_doc_number] => 12189774
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2025-01-07
[patent_title] => Techniques for detecting cloud identity misuse based on runtime context and static analysis
[patent_app_type] => utility
[patent_app_number] => 18/758510
[patent_app_country] => US
[patent_app_date] => 2024-06-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 11563
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 160
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18758510
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/758510 | Techniques for detecting cloud identity misuse based on runtime context and static analysis | Jun 27, 2024 | Issued |
Array
(
[id] => 19516929
[patent_doc_number] => 20240348615
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-10-17
[patent_title] => Automated Content Transport Security
[patent_app_type] => utility
[patent_app_number] => 18/750957
[patent_app_country] => US
[patent_app_date] => 2024-06-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6146
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18750957
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/750957 | Automated Content Transport Security | Jun 20, 2024 | Pending |
Array
(
[id] => 19451341
[patent_doc_number] => 20240311471
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-09-19
[patent_title] => CYBERSECURITY EVENT DETECTION SYSTEM AND METHOD
[patent_app_type] => utility
[patent_app_number] => 18/672230
[patent_app_country] => US
[patent_app_date] => 2024-05-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11400
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18672230
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/672230 | CYBERSECURITY EVENT DETECTION SYSTEM AND METHOD | May 22, 2024 | Pending |
Array
(
[id] => 19605991
[patent_doc_number] => 20240396871
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-11-28
[patent_title] => Methods and Systems for Efficient Cybersecurity Policy Enforcement on Network Communications
[patent_app_type] => utility
[patent_app_number] => 18/672353
[patent_app_country] => US
[patent_app_date] => 2024-05-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 56861
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -27
[patent_words_short_claim] => 384
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18672353
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/672353 | Methods and systems for efficient cybersecurity policy enforcement on network communications | May 22, 2024 | Issued |
Array
(
[id] => 19437120
[patent_doc_number] => 20240305618
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-09-12
[patent_title] => CONTENT ACTIVATION VIA INTERACTION-BASED AUTHENTICATION, SYSTEMS AND METHOD
[patent_app_type] => utility
[patent_app_number] => 18/664216
[patent_app_country] => US
[patent_app_date] => 2024-05-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 16144
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -19
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18664216
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/664216 | CONTENT ACTIVATION VIA INTERACTION-BASED AUTHENTICATION, SYSTEMS AND METHOD | May 13, 2024 | Pending |
Array
(
[id] => 19559502
[patent_doc_number] => 20240371294
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-11-07
[patent_title] => METHOD AND SYSTEM FOR EVALUATING INDIVIDUAL AND GROUP CYBER THREAT AWARENESS
[patent_app_type] => utility
[patent_app_number] => 18/648692
[patent_app_country] => US
[patent_app_date] => 2024-04-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12698
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 311
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18648692
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/648692 | METHOD AND SYSTEM FOR EVALUATING INDIVIDUAL AND GROUP CYBER THREAT AWARENESS | Apr 28, 2024 | Pending |
Array
(
[id] => 19363032
[patent_doc_number] => 20240265066
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-08-08
[patent_title] => SYSTEMS AND/OR METHODS FOR MONITORING AUDIO INPUTS TO JUKEBOX DEVICES
[patent_app_type] => utility
[patent_app_number] => 18/638726
[patent_app_country] => US
[patent_app_date] => 2024-04-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5139
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -21
[patent_words_short_claim] => 253
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18638726
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/638726 | Systems and/or methods for monitoring audio inputs to jukebox devices | Apr 17, 2024 | Issued |
Array
(
[id] => 20304374
[patent_doc_number] => 12450367
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-10-21
[patent_title] => Proximity based authentication system and method
[patent_app_type] => utility
[patent_app_number] => 18/434468
[patent_app_country] => US
[patent_app_date] => 2024-02-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 24
[patent_figures_cnt] => 29
[patent_no_of_words] => 12056
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 335
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18434468
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/434468 | Proximity based authentication system and method | Feb 5, 2024 | Issued |
Array
(
[id] => 19205001
[patent_doc_number] => 20240176900
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-05-30
[patent_title] => SYSTEMS AND METHODS FOR MANAGING HARDWARE PRIVACY CONFIGURATION IN MODERN WORKSPACES
[patent_app_type] => utility
[patent_app_number] => 18/427988
[patent_app_country] => US
[patent_app_date] => 2024-01-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 16699
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 179
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18427988
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/427988 | SYSTEMS AND METHODS FOR MANAGING HARDWARE PRIVACY CONFIGURATION IN MODERN WORKSPACES | Jan 30, 2024 | Pending |
Array
(
[id] => 20003649
[patent_doc_number] => 20250141871
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-05-01
[patent_title] => NETWORK BASED BLOCKING THREAT INTELLIGENCE SYSTEM AND METHODS
[patent_app_type] => utility
[patent_app_number] => 18/425430
[patent_app_country] => US
[patent_app_date] => 2024-01-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 3449
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 44
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18425430
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/425430 | NETWORK BASED BLOCKING THREAT INTELLIGENCE SYSTEM AND METHODS | Jan 28, 2024 | Pending |
Array
(
[id] => 20095312
[patent_doc_number] => 20250225248
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-07-10
[patent_title] => ENHANCING ZERO-TRUST VALIDATOR SERVICES IN COMPUTER APPLIANCE SUPPLY CHAINS
[patent_app_type] => utility
[patent_app_number] => 18/405140
[patent_app_country] => US
[patent_app_date] => 2024-01-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 2501
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 174
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18405140
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/405140 | ENHANCING ZERO-TRUST VALIDATOR SERVICES IN COMPUTER APPLIANCE SUPPLY CHAINS | Jan 4, 2024 | Pending |
Array
(
[id] => 19131985
[patent_doc_number] => 20240137338
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-04-25
[patent_title] => BORDER GATEWAY PROTOCOL (BGP) FLOWSPEC ORIGINATION AUTHORIZATION USING ROUTE ORIGIN AUTHORIZATION (ROA)
[patent_app_type] => utility
[patent_app_number] => 18/399050
[patent_app_country] => US
[patent_app_date] => 2023-12-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6111
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 125
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18399050
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/399050 | BORDER GATEWAY PROTOCOL (BGP) FLOWSPEC ORIGINATION AUTHORIZATION USING ROUTE ORIGIN AUTHORIZATION (ROA) | Dec 27, 2023 | Pending |
Array
(
[id] => 19365703
[patent_doc_number] => 20240267737
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-08-08
[patent_title] => SECURITY POLICY DETERMINATION AND APPLICATION
[patent_app_type] => utility
[patent_app_number] => 18/520835
[patent_app_country] => US
[patent_app_date] => 2023-11-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 15160
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -11
[patent_words_short_claim] => 238
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18520835
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/520835 | SECURITY POLICY DETERMINATION AND APPLICATION | Nov 27, 2023 | Pending |